Satya Prakash Prasad <satyaprakash.developer.unix@xxxxxxxxx> wrote: > After the EAP success case, how peer / server side will read / write > data - which APIs code implements the same - also how do we verify that > EAP authentication was successful before each write / data? After the handshake, session keys are derived from the EAP session using the MSK, and installed into the supplicant (and authenticator) kernel. But, perhaps I mis-undertand your question, are you trying to send more traffic within the EAP-TLS connection?
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap